Vulnerability Description
secfilter in the Samsung kernel for Android on SM-N9005 build N9005XXUGBOB6 (Note 3) and SM-G920F build G920FXXU2COH2 (Galaxy S6) devices allows attackers to bypass URL filtering by inserting an "exceptional URL" in the query string, as demonstrated by the http://should-have-been-filtered.example.com/?http://google.com URL.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samsung | Galaxy S6 Firmware | g920fxxu2coh2 |
| Samsung | Galaxy S6 | - |
| Samsung | Galaxy Note 3 Firmware | n9005xxugbob6 |
| Samsung | Galaxy Note 3 | - |
Related Weaknesses (CWE)
References
- https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0003ExploitTechnical DescriptionThird Party Advisory
- https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0003ExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2016-2567?
CVE-2016-2567 is a vulnerability with a CVSS score of 3.3 (LOW). secfilter in the Samsung kernel for Android on SM-N9005 build N9005XXUGBOB6 (Note 3) and SM-G920F build G920FXXU2COH2 (Galaxy S6) devices allows attackers to bypass URL filtering by inserting an "exce...
How severe is CVE-2016-2567?
CVE-2016-2567 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2567?
Check the references section above for vendor advisories and patch information. Affected products include: Samsung Galaxy S6 Firmware, Samsung Galaxy S6, Samsung Galaxy Note 3 Firmware, Samsung Galaxy Note 3.